diff --git a/articles/linux-vulnerability-detection-with-oval-and-fleet.md b/articles/linux-vulnerability-detection-with-oval-and-fleet.md
index 66a282c556..c86ac9b636 100644
--- a/articles/linux-vulnerability-detection-with-oval-and-fleet.md
+++ b/articles/linux-vulnerability-detection-with-oval-and-fleet.md
@@ -65,9 +65,9 @@ After we’ve evaluated all software tests, we look at all the definitions. For
Once all vulnerabilities are collected, we synchronize the results with what we’ve already stored in the database. Patched vulnerabilities are removed (vulnerabilities that are not present in the result set but exist in the database), and new vulnerabilities are stored (vulnerabilities that are present in the results set but not in the database). If webhooks' automations are enabled, then any newly discovered vulnerability is sent to any configured webhook.
-
+
-
\ No newline at end of file
+